Skip to main content

Advances, Systems and Applications

Table 2 The comparisons on the communication overheads

From: Identity-based remote data checking with a designated verifier

Protocol

DOtoCSP

DVtoCSP

CSPtoDV

Our Protocol

\((n+1)\cdot |\mathbb G_{1}|+\lambda +|T_{Fid}|\)

\(2\cdot |n|+|\mathbb Z_{q}^{*}|\)

\(2\cdot |\mathbb G_{1}|+|T_{Fid}|+|\mathbb Z_{q}|\)

Li et al. [8]

\((n+2)\cdot |\mathbb G_{1}|+\lambda +|T_{Fid}|\)

\(2\cdot |n|+|\mathbb Z_{q}^{*}|\)

\(4\cdot |\mathbb G_{1}|+|T_{Fid}|+|\mathbb Z_{q}|\)

Yu et al. [9]

\((n+1)\cdot |\mathbb G_{1}|+\lambda +|T_{Fid}|\)

\(|\mathbb G_{1}|+|\mathbb G_{2}|+\ell \cdot (|n|+|\mathbb Z_{q}^{*}|)+|pf|\)

\(|\mathbb G_{1}|+|T_{Fid}|+|\mathbb G_{2}|\)

Ji et al. [4]

\(n\cdot (\lambda +|n|+|\mathbb G_{1}|)\)

\(\ell \cdot (|n|+|\mathbb Z^{*}_{q}|)\)

\(3|\mathbb G_{1}|+|T_{Fid}|\)